• 0 Posts
  • 18 Comments
Joined 1 year ago
cake
Cake day: August 18th, 2023

help-circle

  • Do not bring your normal personal devices to China. They are notorious for injecting spyware on foreign devices at every opportunity. Use a freshly formatted device and create all new accounts to use with it.

    Regarding services: do not use self-hosted services unless you you spin up fresh, isolated instances of your services for use while abroad and spin them down afterwards, including formatting any OS they were hosted on.

    Regarding VPN: because we are assuming that any device used in China is compromised, do not connect to your VPN unless you have set up a segregated VLAN and are connecting through a VPN server instance created specifically for use while in China.

    Basically, assume anything you use in China is compromised. And assume your connections are being monitored. And assume that any device you are connecting to from China is at risk of being compromised. So everything needs to be segregated from the rest of your network and set up specifically to be deleted after you’re back home.




  • It is important to note that while a FICO score is roughly equivalent to “trustworthiness”, the three credit agency scores (Equifax, TransUnion, and Experian) are NOT meant to reflect your trustworthiness directly. Rather, they are specifically designed to inform lenders of your profitability for them.

    It’s an important distinction because having a an outstanding payment history alone won’t improve these scores, if you aren’t utilizing available credit and maintaining some running balance with lenders.

    Basically, if you’re just going to borrow money and never pay any interest on the loans, you aren’t actually a source of profit and therefore aren’t a desirable customer for lenders and creditors


  • My solution for this type of situation is MicroBin running on my home network from a non-standard port, with a port knocker to open and close the port when needed.

    My router handle DDNS so I can always contact my home network easily. I port-knock to trigger an iptables command on the router to forward traffic to the MicroBin host.

    I also have my phone set up to connect via openvpn to my home network so that I can remotely do things like start and stop services, set port forwarding rules, etc.












  • neatchee@lemmy.worldtoSelfhosted@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    5 months ago

    Oh boy, let’s take this piece by piece…

    DISCLAIMER: I AM NOT A LAWYER AND THIS IS NOT LEGAL ADVICE

    First: let’s talk about the difference between copyright, patents, and trademark

    A patent protects a method of doing something - like a novel piece of code, or a newly invented drug formula - from being duplicated and used or sold without your consent.

    Copyright protects creative works - like art, books, and computer software - from being mimiced. It literally deals with the rights to copy something

    Trademark protects brands - like a logo or company name - from being used by other people for profit. It usually deals with marketplace confusion, as when someone creates a competing product with a similar logo to try to benefit from the logo’s recognition and popularity.

    So, with that said, what are YOU dealing with?

    Well, since you’re not selling software or utilizing anything from the WatchDogs game universe, you’re pretty much free and clear on both patent and copyright.

    What about trademark?

    Well, on the one hand, you are not competing with Ubisoft in any way, nor are you attempting to represent yourself as related to WatchDogs. So, by the letter of the law (in the US), they don’t have a valid complaint.

    However, trademark under US law has this funny feature where an entity that holds a trademark is required to vigorously defend it when they become aware of potential infringement. This is to prevent the selective application of trademark. That is, if I know John is using my trademark and I don’t go after him, then Steve uses my trademark too, I can’t suddenly claim to have an interest in defending it when I didn’t care before. Steve can point at the fact that I didn’t go after John and say “you already gave up your trademark by failing to enforce it”.

    So how does this impact you? Well, unfortunately, even if you are technically allowed to use “dedsec” under US law, if Ubisoft has a trademark on the term “dedsec” specifically, AND if someone at Ubisoft became aware of your use of their trademark, they would likely come after you for trademark infringement just to cover their ass. You might even win in court, but it would cost a whole lot of money that you would likely never be able to recover.

    The good news is that the very first step in a trademark dispute is a cease and desist letter. They’ll demand you stop using their trademark. At that point you can either comply, refuse, or offer to settle the matter by selling them the domain.

    What you do with this information is up to you.


  • neatchee@lemmy.worldtoMildly Infuriating@lemmy.worldFor security reasons
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    edit-2
    6 months ago

    Security professional here. This is legit a good call on their part. It’s because those types of addresses won’t bounce emails but aren’t necessarily in your control; it’s very, very easy to spam those petition forms with mail@ for a million real domains without bouncing the emails, making them seem legit.

    You own your domain, obviously, so it’s really as simple as creating a forwarding/alias address of “changeorg@domain.tld”. If creating a forwarding/alias address is that much of a problem for you I suggest that you likely shouldn’t be hosting your own email in the first place.

    Your laziness isn’t a good reason to be upset with a company taking steps to reduce their security overhead significantly